John McAfee: As the dark Web bubbles up to the mainstream, hacking just got easier

Backlit Keyboard
CreativeCommons
John McAfee is one of the most influential commentators on cybersecurity anywhere in the world. His new venture — Future Tense Central — focuses on security and personal privacy-related products. McAfee provides regular insight on global hacking scandals and internet surveillance, and has become a hugely controversial figure following his time in Belize, where he claims to have exposed corruption at the highest level before fleeing the country amid accusations of murder (the Belize government is currently not pursuing any accusations against him).

Co-author Rob Loggia is a white hat hacker and has worked with McAfee doing research and data collection for as far back as McAfee can remember.

The percentage of the population that has some form of tech savvy is higher than it has ever been. Many 21st century grandmothers know how to tweet using their iPhones and they no longer makes a funny face when told to “Google” something. Progress. And our level of dependence on computer systems in business and industry is complete. Computers are everywhere, and they now power the infrastructure and processes that make everything go. And the more we come to depend on these systems, the higher the stakes when someone tries to harm us by hacking them.

Behind the Internet of networked computers that everyone sees and uses on a daily basis lies another, deeper realm that can be collectively termed the Internet Underground. This underground consists of the deep web and the dark web. The deep web is the collection of information that is available on networked computers, but is not indexed by search engines and other typical data-retrieval tools. The dark web consists of overlay networks that use the same infrastructure as the public web, but require special tools and knowledge to access. Both lay beyond the casual reach of the typical Internet user.

Hacker playground

The Internet Underground represents a playground for hackers. Here can be found troves of information, never intended to be publicly shared,  that can be used to create havoc in the physical world. It also contains a wealth of information that can be used to gain even more sensitive data from private networks and computers – information that fuels the attack vector for most successful hacking attempts.

John McAfee
John McAfee

A look at the world’s worst hacks reveals a common pattern: Most were not accomplished by using sophisticated hacking tools or brute force attacks on security mechanisms. Consider one of the worst of these – the 2012 attack on Saudi Aramco, one of the world’s largest oil companies. Within hours, nearly 35,000 distinct computer systems had their functionality crippled or destroyed, causing a massive disruption to the world’s oil supply chain. It was made possible by an employee that was fooled into clicking a bogus link sent in an email. This is social engineering.

In fact 90 percent of hacking is social engineering. We – the user – are the weakest link in the chain of computing trust, imperfect by nature. And all of the security software and hardware in the world will not keep a door shut if an authorized user can be convinced to open it.

Good news

The good news is that there are patterns that we can look at and, in some cases, use to predict where the next attack may fall. Experienced hackers don’t concern themselves much with your firewalls, anti-spyware software, anti-virus software, encryption technology, etc. They want to identify human weakness. If they’re targeting a company, they might examine whether management personnel are frequently shuffled; whether employees are dissatisfied; whether nepotism is tolerated; whether IT managers have stagnated in their training and self improvement. They want to know what level of transparency exists within the corporation and how bloated the chain of command is. In short – they want to know how healthy and nimble the organization is.

Information wants to be free; like water it will flow freely once released from its container.

While anyone is susceptible to an attack at any time, hackers, like anyone else, will tend to go after the low-hanging fruit. Why go after a tightly-knit organization of competent, satisfied professionals supported by a stable IT staff unless there is a tremendous and unique payoff promised? There would be greater risk involved, and the chances of success would be low. Instead they will target an organization with identified human and structural problems.

To make this identification, hackers have traditionally turned to the Internet Underground. But recently it has started to become even easier. The Internet Underground is beginning to spill over into the mainstream web. Shocking types of information that used to be available only for a price on the dark web can now be found using simple Web searches or mobile apps. And found by anyone. While some of this information may seem innocuous to the untrained eye, the fact is that much of it is manna falling from hacker heaven.

Time to reflect

What this means is that protecting systems and networks against successful attack just got harder, and will require us to take a good look at ourselves and our organizations. IT professionals are accustomed to securing hardware and software. But how well do you know the human side of your technology? Is there information about your organization or your personal life out there, right now, migrating out of the Internet Underground to appear in simple web searches? Does this information make you, your family, or your organization an attractive target?

Answering these questions honestly and taking the time to find out for ourselves what information is already available about us needs to become required best practices for security. We are accustomed to securing systems and networks against sophisticated teams of hackers. But information wants to be free; like water it will flow freely once released from its container. Are you prepared for a world where grandma or anyone else can quickly obtain, on the wide open Web, all of the necessary information for a social-engineering hack? Are you prepared?

The views expressed here are solely those of the author and do not reflect the beliefs of Digital Trends.

Emerging Tech

Awesome Tech You Can’t Buy Yet: Robots that eat landmines and clean your floors

Check out our roundup of the best new crowdfunding projects and product announcements that hit the web this week. You may not be able to buy this stuff yet, but it's fun to gawk!
Cars

Ford is keeping hackers out of its cars by putting key fobs to sleep

Ford found a way to stop thieves who try to hack their way into a car by duplicating its key fob. It developed a smart key fob that puts itself to sleep when it's idle for at least 40 seconds. It automatically wakes up when someone picks it…
Gaming

Tired of the same PS4 annual releases? Try one of these indie games instead

While big budget games rely on practical innovation, indie games dive head first into new, unexplored territories. If the quirky and unusual appeal to you, take a look at our list of the best indie games on PS4.
Computing

Worried about your online privacy? We tested the best VPN services

Browsing the web can be less secure than most users would hope. If that concerns you, a virtual private network — aka a VPN — is a decent solution. Check out a few of the best VPN services on the market.
Home Theater

How the headphone jack helps Samsung out-Apple the king

Samsung’s latest flagship phones and wearables unveiled at the Galaxy Unpacked event had plenty of exciting new tech. But one of the most useful features Samsung revealed is also the oldest: The mighty headphone jack.
Gaming

Age of Empires II thrives 20 years later. Here's what Anthem could learn from it

Age Of Empires II is approaching its 20th birthday. It has a loyal following that has grown over the past five years. New always-online games like Anthem would love to remain relevant for so long, but they have a problem. They're just not…
Smart Home

Alexa may be everywhere, but it’s Google’s Assistant I want in my home. Here’s why

The Amazon Alexa may have the Google Home beat in quantity of skills and compatibility with other products, but does that really matter when Alexa falls flat for day-to-day conversation?
Gaming

Devil May Cry is Fantastic, but I still want a DmC: Devil May Cry sequel

Capcom's Devil May Cry 5 is one of the best games of 2019 and a welcome return for the series, but its success should not discount just how wonderful Ninja Theory's DmC: Devil May Cry really was.
Gaming

DMC 5’s greatness is a reminder of all the open world games that wasted my time

Devil May Cry 5 modernizes the stylish action combat while retaining its storied PS2 roots. More so, though, it reminded me that we could sure use more linear, single player games to combat the sea of open world games.
Gaming

Don't get the hype over Fortnite? Let us change your mind

Fortnite arrived very quietly but after launching Battle Royale mode it became a cultural phenomenon. Today, Fortnite is one of the most content prolific online games and it's starting to change the meta.
Mobile

Hey Google, why did you kill off Allo, your best messaging app in years?

Allo, Google's messaging app, has shut down. I convinced my closest friends and family to switch to the app two-and-a-half years ago when it debuted, and we've been using it since. With its death, I'm feeling pain and sadness.
Mobile

Apple’s new iPads are hardly new at all. Don’t waste your money

It has taken Apple four years to get around to updating the iPad Mini line, but the new iPad Mini is virtually identical to its predecessor. It’s joined by a confusing iPad Air with no obvious target audience. Is Apple just trying to sell…
Home Theater

There isn’t a single good reason to buy Apple’s new AirPods

After nearly a three-year wait, Apple has finally announced a new version of its popular true wireless headphones, the AirPods. We had high hopes for vast improvements, but that's not what we got.
Gaming

The Division 2 offers nothing but a funhouse mirror of America

Tom Clancy's The Division 2 improves on the design shortcomings of the original game in several different ways, but its version of Washington D.C. is completely removed from reality.